When Disaster Strikes: Is Your Data Safer In The Office Or The Cloud?

Published: 2 February 2018

UK cloud adoption rate has reached 88 per cent, however while many businesses are adopting a cloud-first approach, some are scared to take the plunge, with data security as their top concern. If you are wondering which option is more secure, explore our handy comparison…

Is cloud computing safe?

Cloud computing has gained popularity in the business space over the last  years, however for many the thought of migrating company data to a piece of intangible technology named after a weather phenomenon is a scary concept. We get it. Nonetheless, cloud is certainly here to stay and like with any kind of platform, there are pros and cons that you should consider before determining if it is the right match for your company…

The good

Security – Cloud providers eat, sleep and breathe security, employing measures beyond the affordability of most businesses, therefore your data is often safer in the cloud than on a server in your offices.

Compliance – Cloud businesses have to build secure data centres that are independently audited and adhere to information security standards such as ISO/IEC 27001: 2013, meaning your data is well protected.

Control – With the cloud, you can benefit from additional security services like encryption which means that even if your device is lost or stolen, you can remotely wipe data so that it doesn’t get into the wrong hands, ever!

Peace of mind – Cloud providers often provide solutions that will automatically apply security updates to all your devices, removing the headache from your IT department and ensuring systems are secure at all times. More here >

Protection against natural disasters – Although you can back up your data safely on-premise, in the event of a disaster (human error or natural disaster such as fire or flood) a cloud back up will allow you to be back in business within hours.

The Bad

Connectivity – Cloud relies on internet access and therefore there needs to be a secure and resilient connection in place. Users need to be educated on how to identify malicious sites and links as human factor is often the weakest link in the cyber-security battle.

Increased attacks – The attacks on cloud-based applications and software will continue to increase but so is the response from cloud providers with the development of advanced security technologies, so really not ‘bad’ per say.

On-premise: Better the devil we know?

The most attractive aspect of using an on-premise is having full control over the physical and human risks associated with data protection. This capability is its biggest strength and ironically, its biggest weakness…

The good

Physical control – The closer you hold the data, the easier it is to protect it but bear in mind appropriate security measures that must be put in place.

Flexibility – It’s possible for you to connect on-premise solutions to cloud services in a secure way that enhances data management and meets security needs.

Trust – With on-premise systems closely managed in house, there is usually a greater level of trust and alignment to business priorities.

The bad

Cost – On-Premise Security requires a significant initial investment in hardware, software, as well as backups and disaster recovery services.  Can you afford the upfront investment required in an on-premise security solution?

Resource strain – With traditional IT infrastructure, you are responsible for the protection of your data, and it can take significant resource to ensure the right security strategies are implemented and data recovery systems are in place.

Difficult to manage – IT systems rely on so many different pieces of software that keeping everything fully up-to-date can become an impossible task.

Vulnerable to natural disasters – There is nothing worse than coming into work in the morning to find that your work from the day, week or month before is missing. Sounds far-fetched, but is more common than you think. Think about it – with on-premise systems, in the event of a disaster, your data becomes vulnerable.

Read More